General

  • Target

    653-1-0x00008000-0x00020b48-memory.dmp

  • Size

    96KB

  • Sample

    241227-c5ffwszpck

  • MD5

    6e43a8688c3538fe7f36384cf5bdea38

  • SHA1

    425d585c696334bdf81af8f23eaa845f50075d88

  • SHA256

    a5e3cb72cb2d87fda9581711efcf983fc7cb9cbb7cd3f03c459515d3b23cf689

  • SHA512

    4a83d43a20746d317a9d4933d5d469b1430e9579cbef566d03fad3b0bd01d95c79521d92451eb1b8ecc2120352fbea4c312ea4f38356b4fc817d3b45d9b1f68a

  • SSDEEP

    1536:7XngVzkN5QQNenlbzOPARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWdCEYr:CQNJE/BB3Ir2ZlmcKMFN1DUEA

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      653-1-0x00008000-0x00020b48-memory.dmp

    • Size

      96KB

    • MD5

      6e43a8688c3538fe7f36384cf5bdea38

    • SHA1

      425d585c696334bdf81af8f23eaa845f50075d88

    • SHA256

      a5e3cb72cb2d87fda9581711efcf983fc7cb9cbb7cd3f03c459515d3b23cf689

    • SHA512

      4a83d43a20746d317a9d4933d5d469b1430e9579cbef566d03fad3b0bd01d95c79521d92451eb1b8ecc2120352fbea4c312ea4f38356b4fc817d3b45d9b1f68a

    • SSDEEP

      1536:7XngVzkN5QQNenlbzOPARLBKUY4mYhbyMOrlcDZlmcKqF36riFNYIGYVKWdCEYr:CQNJE/BB3Ir2ZlmcKMFN1DUEA

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks